Welcome to Legal Cyber Security Expo the UK's first exhibition and conference for the world of cyber security.

On the 21 & 22 March 2018, the London ExCeL arena will become the home for the brand new and exciting exhibition, Europe’s fastest-growing event dedicated to helping law firms, independent solicitors and Global organisations defend themselves against the increasing threat of cyber attacks.

This revolutionary exhibition will run alongside Legalex, Europe’s largest legal event specifically designed to help the most ambitious businesses evolve and expand. Over two innovation-filled days, this exhibition will also house the latest systems and services that all law firms, teams and organisations should implement to minimise the risk of a potentially devastating cyber hack.

When Is The Show?

21st to 22nd March 2018, ExCeL London

Doors: Wednesday 10AM - 5PM Thursday 10AM - 4PM

Legal Cyber Security Expo Runs At ExCel London, Alongside

STAND NUMBER: L440

Digital Pathways

Digital Pathways has been in the data protection and cyber security market for over 20 years.

We have a range of solutions to meet today`s complex requirements for compliance and data privacy including GDPR.

Our success is based on our team of professionals, highly trained in data and cyber security, who have worked extensively in the commercial world and know how solutions work in practice. Theory is the starting block; practical, successful application is the end result.

Digital Pathways has a full range of data security solutions, some of which are also offered as a fully managed service, to match your business needs in a flexible, cost efficient manner.

Secure Log Management and Reporting
Provides secure log storage and periodic reporting of access to your servers and devices regardless of location.
• Logs are monitored for integrity (the logs are not changed in any way)
• Logs are encrypted with AES256.
• Logs are stored in a secure appliance.
• Periodic reports are sent via email to nominated individuals detailing the activity specified in the reports.
• Raw Logs can be made available at any time for audit or regulatory/law enforcement analysis.

User Monitoring and Analytics
We can enable your organisation to monitor administrators and users in their daily access to corporate resources, and provide instant training on best practice to the individuals via on screen messages. Any session can be recorded if an individual performs an unapproved action. All these statistics are stored and used to provide analytics on a user behaviour, which can be used to trigger an alert to unusual behaviour and prevent a breach before it happens.
• Low impact recording and monitoring
• Clear concise analytics via an informative dashboard
• Customisable messages to improve user understanding of company policies
• Improves user awareness of data security
• Reduces the Insider Threat

Transparent Data Encryption
All formats of data can be protected using our transparent data encryption services for any sensitive information residing on your servers whether they are cloud based or within your local network environment, without any changes to the server operation or modification to the application.
• Provides cryptographically strong key storage.
• Robust access controls to protected data.
• Completely transparent to existing applications.
• Very low impact to services and performance.
• Strongly protected encryption keys residing within the European Union.
• Invisible to authorised users of the data and no training required to use the system.
• Database or application level encryption to comply with PCI.

Oracle and Microsoft SQL Server Encryption
We can offer secure Oracle Wallet or MSCAPI secure automated key storage for your cryptographic key material relating to your Oracle or Microsoft SQL servers regardless of its location.
• Secure key storage and management.
• Keys not stored with the Database server.
• Keys not available to the Database Administrator at any time.
• TDE/wallet keys stored in multiple secure tamper proof appliances.
• We have no access to your encryption keys at any time.

Automated Server Compliance Auditing and Reporting
By working with you to develop a set of criteria your servers must achieve, we can then integrate this into our automated Auditor tool to generate periodic compliance reports. This information enables you to track patch levels, software and domain policy, applications and trends across all your servers giving you and your auditor visual and immediate information on your systems. This is then used to demonstrate your corporations` compliance with regulations, governance and best practice policies.

Managed SIEM services
By working together with your organisation`s infrastructure, server and network teams we can provide On or Offsite Security Incident and Event management services, integrating and correlating logs and events from your equipment to provide actionable security intelligence relating to your servers, desktops, mobiles and network infrastructure, delivering periodic reporting and near real time alerting and enabling consistently reliable and effective oversight of your security posture.

Protective Marking of Documents and Emails
We can install and manage a flexible solution for protective marking of any document or email created within your organisation, providing
• Multi-level options for document classification
• Detailed auditing of document control and violations
• Control of document leakage or inappropriate emailing of information.
• Not limited to documents but can be applied to images, PDF`s and Web Outlook emails